Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
8efb04e134f7921c3cfd3ceb66256c58_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8efb04e134f7921c3cfd3ceb66256c58_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8efb04e134f7921c3cfd3ceb66256c58_JaffaCakes118.html
-
Size
97KB
-
MD5
8efb04e134f7921c3cfd3ceb66256c58
-
SHA1
3a60207a14d74feec323d969affed2e8111e39d4
-
SHA256
912e4b7f70305b5cd6aed702690a70759d0cf5a541059db378574f7daf081e12
-
SHA512
375d9405c2b8e0015798b38a485cca05e32df4fab4377b780d3470deef1be54e89999618df0301aa1a714c2ced7a65e000ce65a432a4d782a08fd311926befbb
-
SSDEEP
1536:SXSM8zRgaEL6VmKCKzZ2wQzRakFZWJRigGEFhH2csw:SXSEaEL6sKClTzRdIigGQH2cF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 452 msedge.exe 452 msedge.exe 3756 msedge.exe 3756 msedge.exe 3796 identity_helper.exe 3796 identity_helper.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe 3756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3756 wrote to memory of 976 3756 msedge.exe 86 PID 3756 wrote to memory of 976 3756 msedge.exe 86 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 1716 3756 msedge.exe 87 PID 3756 wrote to memory of 452 3756 msedge.exe 88 PID 3756 wrote to memory of 452 3756 msedge.exe 88 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89 PID 3756 wrote to memory of 4976 3756 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8efb04e134f7921c3cfd3ceb66256c58_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80c1846f8,0x7ff80c184708,0x7ff80c1847182⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,358245324665900145,1131707542243264240,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD5c3d142c1ffb5c6d76f8b7c96ff4d84fe
SHA1c3dc2b4538ccca8e0633cd23d9053f1f9739c509
SHA256369b7e6ea8c08a3e6a7dd462b4c3b130e7257fffb81bc889e3ca7828637a4b25
SHA512760f5b2e2693eeecc956e257fbca5e7720e5c33ecad0dd6d83a1df2d797c53a517ffd37d82c50fca34985ab260a5fad3bd9cf7e9fb7fc971acaa2f5951505a69
-
Filesize
6KB
MD56d57d014695c6efdae1d17786e9a2301
SHA1ef9b5d4c74e8e03abecdb31f0c8466723af8fcf9
SHA256e9b7fd4e1bb9a8f11d29900ebcae235abf8b8be2a59405d825cd95560b1e873a
SHA5125ee87c8e3911023c216e4b6a4b278297fe381ad42a267cfc2ab07d672f94dcddc2f141d5dfec8a582ec488c0f177cbf6aec0b9cc5f7daae8ee5c52a49699758d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53d344272a8a630764103f7b500041163
SHA160b6ef48ddd99bed69bbdbb6e1e1782a0c40ee4c
SHA25672b688f170557938ad04bf10263aa5eeb26c35435611322b3b3970a893cec52a
SHA5126ec8fb159a3e070ffd31d10898a8a67d09facbfe81b876dbc5b1c69cb19adb98acfaba163ff8f5764fa5f3dfdfcf60e9314933acdfc0473efb3ebfd657aea72b